Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Information is a strategic resource
One of the most important governmental assets is (personal) information. The vision of Mr. Deprest and Mr. Robben on how information should be dealt with in Belgian federal eGovernment can be summarized as follows:
Information should be modelled in a flexible way that maximally takes into accounts the users’ needs.
Information should be managed efficiently during its whole life-cycle. This means inter alia that information should be collected only once, and maximally reused. In addition, a functional task division should be agreed on, to know which government entity stores which data in authentic form. As a result, an authentic source is determined for each data within the government.
Information should be exchanged electronically where possible, based on a functional and technical interoperability framework and based on the usage of common identification keys for all relevant entities.
Information should be adequately protected, and managed in accordance with data protection regulation.
It would lead us too far to describe all these aspects here. We will limit us to the description of the last part of the third bullet point (common identification keys), which is relevant for the current case study.
First of all, a strictly regulated globally unique identifier appears to be assigned to all Belgian citizens at their first registration in the National Registry (at birth). Second, a number of identity data is being held by the National Registry. This data could also be used to uniquely identify Belgian citizens. Third, there are a number of identifiers that apply to the other entities that are relevant for the government (rights, duties). Finally, there is the roll out of the Belgian electronic identity card, which is, inter alia, being used for global identification and authentication of the holder towards the government and other entities.
We briefly discuss these topics in sections 6.4 and 6.5.
27 / 45 |